Description
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
Remediation
References
https://github.com/NetEase/pomelo/issues/1149
https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation
Related Vulnerabilities
CVE-2020-7743 Vulnerability in maven package org.webjars.bower:mathjs
CVE-2018-20676 Vulnerability in npm package bootstrap-sass
CVE-2019-10431 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2021-23380 Vulnerability in npm package roar-pidusage
CVE-2016-2173 Vulnerability in maven package org.springframework.amqp:spring-amqp